CVE-2020-36623
CVSS V2 None
CVSS V3 None
Description
A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475.
Overview
- CVE ID
- CVE-2020-36623
- Assigner
- cna@vuldb.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-21T19:15:12
- Last Modified Date
- 2022-12-28T18:46:11
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:pengu_project:pengu:*:*:*:*:*:*:*:* | 1 | OR | 2020-11-02 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/jtojnar/pengu/commit/aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91 | |
https://vuldb.com/?id.216475 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-36623 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36623 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-21 20:16:15 | Added to TrackCVE | |||
2022-12-21 20:16:16 | Weakness Enumeration | new | ||
2022-12-22 19:15:43 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2022-12-28 19:14:47 | 2022-12-28T18:46:11 | CVE Modified Date | updated | |
2022-12-28 19:14:47 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-28 19:14:51 | CPE Information | updated |